Teraoka, Fumio

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science (Yagami)

Position

Professor

Related Websites

External Links

Career 【 Display / hide

  • 1984.04
    -
    1988.02

    キヤノン株式会社

  • 1988.04
    -
    2001.03

    株式会社ソニーコンピュータサイエンス研究所

  • 2001.04
    -
    Present

    大学教授(理工学部情報工学科)

  • 2001.10
    -
    2007.09

    理工学インフォメーションテクノロジーセンター所長

  • 2002.10
    -
    2003.09

    大学学生総合センター委員(矢上支部)

display all >>

Academic Background 【 Display / hide

  • 1982.03

    Keio University, Faculty of Engineering

    University, Graduated

  • 1984.03

    Keio University, Graduate School, Division of Engineering

    Graduate School, Completed, Master's course

Academic Degrees 【 Display / hide

  • 工学, Keio University, Dissertation, 1993.03

    A Study on Host Mobility in Wide Area Computer Networks

 

Research Areas 【 Display / hide

  • Information network

Research Keywords 【 Display / hide

  • Internet, Distributed Systems

Research Themes 【 Display / hide

  • New Generation Network Architecture, 

    2007
    -
    Present

 

Books 【 Display / hide

  • Wireless IP and Building the Mobile Internet

    TERAOKA FUMIO, Artech House Publishers, 2003.01

    Scope: 415-439

  • ワイヤレスLANアーキテクチャ

    TERAOKA FUMIO, 共立出版, 1996.06

    Scope: 73-108

Papers 【 Display / hide

  • Nishikaze: Self-Sustained Wind Power Supply Employing Potential Energy Conversion Method

    Teraoka F., Nishiura S., Ohno H.

    ACM International Conference Proceeding Series (ACM International Conference Proceeding Series)     151 - 156 2021.01

    ISSN  9781450381840

     View Summary

    In an IoT (Internet of Things) system, if image data can be collected in addition to sensor data, the amount of information obtained will increase significantly, which is very useful for monitoring natural disasters, for example. Considering communication speed and covering range, it is assumed that Wi-Fi multi-hop communication is appropriate for image data transmission. Since Wi-Fi consumes a large amount of power, a power supply for sensor nodes is required. Therefore, we are developing a self-sustaining wind power supply called Nishikaze which employs the potential energy conversion method. In this paper, we produced the Nishikaze second prototype. The measurement results of the amount of the generated power show that the Nishikaze second prototype can cover the power required to transmit an image of 500 kbytes at a 10 minute interval assuming that 3 m/s of wind blows for 6 hours in a day, 100 % of the generated power is available, and the active period of sensor nodes is 5 seconds.

  • GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN

    Wakui T., Kondo T., Teraoka F.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))  12081 LNCS   196 - 211 2020

    ISSN  9783030457778

     View Summary

    This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Path Aggregate without Labeled data). GAMPAL does not require labeled data to achieve a general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Routing Information Base), GAMPAL introduces path aggregates. The BGP RIB entries are classified into the path aggregates, each of which is identified with the first three AS numbers in the AS_PATH attribute. GAMPAL establishes a prediction model of traffic throughput based on past traffic throughput. It adopts the LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model focusing on periodicity in weekly scale of the Internet traffic pattern. The validity of GAMPAL is evaluated using the real traffic information and the BGP RIB exported from the WIDE backbone network (AS2500), a nation-wide backbone network for research and educational organizations in Japan. As a result, GAMPAL successfully detects traffic increases due to events and DDoS attacks targeted to a stub organization.

  • LiON: A L3 protocol agnostic experimental network construction tool based on infrastructure as code

    Hayashi K., Watanabe H., Kondo T., Teraoka F.

    2019 6th International Conference on Software Defined Systems, SDS 2019 (2019 6th International Conference on Software Defined Systems, SDS 2019)     64 - 71 2019.06

    ISSN  9781728107226

     View Summary

    An experimental network environment plays an important role to examine new protocols and systems. This paper proposes an IaC (Infrastructure as Code) based tool called LiON (Lightweight On-demand Networking) for constructing virtual networks on the Internet for various experiments. For virtual nodes, various types of virtualization technologies such as network namespace, container, and virtual machine are supported. VXLAN is employed for virtual links between virtual nodes. JSON (JavaScript Object Notation) is adopted as the configuration file format, which enables the experimenter to intuitively design virtual network topologies. Layer-3 protocol agnostic experimental networks can be constructed, which enable to examine non-IP protocol stacks. LiON is implemented in Python and shell script. The time for constructing a virtual network slightly increases as the number of virtual nodes increases. TCP throughput of a virtual link is approximately 97 % of that of a physical link.

  • Moclis: A moving cell support protocol based on locator/ID split for 5G system

    Ochiai T., Matsueda K., Kondo T., Takano H., Kimura R., Sawai R., Teraoka F.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E102B ( 8 ) 1649 - 1659 2019

    ISSN  09168516

     View Summary

    In LTE (Long Term Evolution) / LTE-Advanced (LTE-A) system, the user-plane for a user equipment (UE) is provided by tunneling, which increases header overhead, processing overhead, and management overhead. In addition, the LTE-A system does not support moving cells which are composed of a mobile Relay Node (RN) and UEs attached to the mobile RN. Although there are several proposals for moving cells in the LTE-A system and the 5G system, all of them rely on tunneling for the user-plane, which means that none of them avoid the tunneling overheads. This paper proposes MocLis, a moving cell support protocol based on a Locator/ID split approach. MocLis does not use tunneling. Nested moving cells are supported. Signaling cost for handover of a moving cell is independent of the number of UEs and nested RNs in the moving cell. A MocLis prototype, implemented in Linux, includes user space daemons and modified kernel. Measurements show that the attachment time and handover time are short enough for practical use. MocLis has higher TCP throughput than the tunneling based approaches.

  • Inserting layer-5 to provide applications with richer functions through common API

    Watanabe H., Kondo T., Kaneko K., Teraoka F.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E101B ( 9 ) 1967 - 1981 2018.09

    ISSN  09168516

     View Summary

    Recently, application demands placed on the network have become more multifaceted. Highly functional application-to-application communication services such as bandwidth aggregation, fault tolerant communication, and delay/disruption tolerant networking (DTN) were developed independently in the network layer, the transport layer, and the application layer. As a result, protocol layering has become complicated. This paper proposes to insert Layer-5 (L5) between the application layer and the transport layer to separate communication policies and communication mechanisms to make protocol layering clearer. The transport layer (L4) provides end-to-end communication mechanisms such as reliable byte stream while L5 realizes communication policies such as bandwidth aggregation by combining the communication mechanisms in L4. This paper proposes five types of L5-paths as communication policies: (1) the L5 bundled path for bandwidth aggregation or fault tolerant communication, (2) the L5 spatially-spliced path for communication with middleboxes, (3) the L5 temporally-spliced path for DTN, (4) the L5 spliced-bundled path, and (5) the L5 bundled over spatially-spliced path. An application can select and use an appropriate L5-path depending on the network circumstances through a common API. A prototype of L5 is implemented in the Linux user space as a library to make deployment and maintenance easier. An evaluation shows that establishment time of L5-paths is short enough and performance of L5-paths is comparable or superior to existing technologies.

display all >>

Presentations 【 Display / hide

  • Constructing Network Slices with Locator/ID Split and Locator Division for 5G Core Network

    Kohei MatsuedaTakamasa OchiaiHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    5th International Workshop on 5G Architecture (5GARCH) (Kansas City, MO, U.S.A.) , 2018.05, Oral Presentation(general), IEEE

  • MocLis: a Non-Tunneling Moving Cell Support Protocol Based on Locator/ID Split for 5G System

    Takamasa OchiaiKoei MatsuedaTakao KondoHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    IEEE International Conference on Communications 2018 (ICC 2018) (Kansas City, MO, U.S.A.) , 2018.05, IEEE

  • PTP Accuracy Measurement Comparison between Boundary Clock and VLAN Priority

    Koki HoritaShota ShiobaraTakao OkamawariFumio TeraokaKunitake Kaneko

    International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS 2017), 2017.09, Oral Presentation(general)

  • Separating Communication Policies and Mechanisms to Make Protocol Layering Clearer

    Hiroki WatanabeTakao KondoKunitake KanekoFumio Teraoka

    The 26th International Conference on Computer Communications and Networks (ICCCN 2017) (Vancouver, Canada) , 2017.07, Oral Presentation(general), IEEE

  • Layer-5 Temporally-Spliced Path for Efficient Disruption Tolerant Networking

    Daiki MitakeKunitake KanekoFumio Teraoka

    IEEE International Symposium on Local and Metropolitan Area Networks 2017 (LANMAN2017) (Osaka, Japan) , 2017.06, Oral Presentation(general), IEEE

display all >>

Intellectual Property Rights, etc. 【 Display / hide

  • ネットワーク構成検出装置、ネットワーク構成検出システム、ネットワーク構成検出方法及びネットワーク構成検出プログラム

    Application No.: 特願2017-136873  2017.07 

    Announcement No.: 特開2019-022007   

    Registration No.: 特許 2017-136873(2017/07/13)  

    Patent, Joint, National application

  • ストレージサーバ装置、ネットワーク情報共有システム、ネットワーク情報共有方法及びネットワーク情報共有プログラム

    Application No.: 特願2016-153376  2016.08 

    Announcement No.: 特開2018-023018  2018.02 

    Registration No.: 特許 2016-153376(2016/08/04)  

    Patent, Joint, National application

  • 通信装置、システム及び方法

    Application No.: 特願2015-148962  2015.07 

    Announcement No.: 特開2017-034305  2017.02 

    Registration No.: 特許 2015-148962(2015/07/28)  

    Patent, Joint, National application

  • 通信システム、通信制御方法、ノード装置及びプログラム

    Application No.: 特願2014-132479  2014.06 

    Announcement No.: 特開2016-12776  2016.01 

    Registration No.:   2018.01

    Patent, Joint

  • 通信制御方法,通信システム,ノード装置,及びプログラム

    Application No.: 特願2013-115784  2013.05 

    Announcement No.: 特開2014-236321  2014.12 

    Registration No.: 特許第5990492号  2016.08

    Patent, Joint

display all >>

Awards 【 Display / hide

  • 情報処理学会 平成12年度論文賞

    SHITAMA KAZUHIRO TERAOKA FUMIO, 2001.05, 情報処理学会, 移動指向ネットワークアーキテクチャの設計と実装

    Type of Award: Awards of National Conference, Council and Symposium

  • 情報処理学会 平成12年度論文賞

    2001, 情報処理学会

  • 高橋奨励賞

    TERAOKA FUMIO, 1992.06, 日本ソフトウェア科学会, Virtual Internet Protocol の実装と評価

    Type of Award: Awards of National Conference, Council and Symposium

  • 日本ソフトウェア科学会 高橋奨励賞

    1992, 日本ソフトウェア科学会

 

Courses Taught 【 Display / hide

  • UNIX SYSTEM PROGRAMMING

    2021

  • SECURITY HANDS-ON 1

    2021

  • RECITATION IN INFORMATION AND COMPUTER SCIENCE

    2021

  • NETWORK ENGINEERING 1 B

    2021

  • NETWORK ENGINEERING 1 A

    2021

display all >>

Courses Previously Taught 【 Display / hide

  • UNIX System Programming

    Keio University, 2013, Autumn Semester, Major subject, Lecture, Within own faculty, 1h

  • Advanced Course on Network Engineering

    Keio University, 2013, Spring Semester, Major subject, Lecture, 1h

  • Network Engineering I

    Keio University, 2013, Spring Semester, Major subject, Lecture, Within own faculty, 1h

 

Memberships in Academic Societies 【 Display / hide

  • 情報処理学会, 

    1995
    -
    Present
  • 日本ソフトウェア科学会, 

    1991
    -
    2017
  • IEEE

     
  • 電子情報通信学会

     
  • ACM

     

Committee Experiences 【 Display / hide

  • 2017

    第34回大会委員長, 日本ソフトウェア科学会

  • 2015

    Technical Program Co-Chair, Asian Internet Engineering Conference 2015 (AINTEC2015), ACM

  • 2014.05
    -
    Present

    IEICE Transactions on Communications編集委員, 電子情報通信学会

  • 2014

    Technical Program Co-Chair, Asian Internet Engineering Conference 2014 (AINTEC2014), ACM

  • 2013

    Editor-in-Chief, Special Section on Internet Architectures, Protocols, and Management Methods that Enable Sustainable Development, IEICE Transactions on Communications, The Institute of Electronics, Information and Communication Engineering (IEICE)

display all >>